Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic
好的,我现在要帮用户总结这篇文章的内容。用户的要求是用中文总结,控制在100字以内,不需要特定的开头,直接写描述即可。 首先,我需要通读整篇文章,抓住主要信息。文章主要讲的是Cisco Talos研究人员发现了一个新的恶意软件PowMix,它是一个之前未被记录的僵尸网络,针对捷克共和国的劳动力进行攻击。 攻击链开始于一个恶意的ZIP文件,通过钓鱼邮件传播。ZIP文件中包含Windows快捷方式(LNK),启动PowerShell加载器,进而提取、解密并运行恶意软件。PowMix的特点包括随机的C2信标间隔、加密心跳数据、动态更新C2域名等,这些都是为了逃避检测。 此外,PowMix还能执行远程访问、侦察和代码执行,并通过计划任务实现持久性。它还带有误导机制,打开合规主题的诱饵文档,引用合法品牌和数据以增强可信度。 文章还提到PowMix与之前的ZipLine活动有战术上的重叠,比如使用相同的ZIP交付方式、计划任务持久性和滥用Heroku作为C2服务器。但目前尚未发现最终的有效载荷,动机尚不明确。 最后,文章还提到了另一个僵尸网络RondoDox的能力扩展,包括加密货币挖掘和DDoS攻击。 现在我需要将这些信息浓缩到100字以内。重点应放在PowMix的特点、攻击方式、逃避检测的机制以及与其他活动的关系上。 可能的结构是:研究人员发现PowMix僵尸网络针对捷克劳动力;通过钓鱼邮件传播;使用随机信标间隔和加密数据;具备远程控制功能;与ZipLine活动有战术重叠;动机不明。 现在检查字数是否在限制内,并确保信息准确且连贯。 </think> 研究人员发现了一个名为PowMix的新僵尸网络,针对捷克共和国劳动力展开攻击。该恶意软件通过钓鱼邮件传播恶意ZIP文件,并利用随机C2信标间隔和加密数据来规避检测。PowMix可执行远程访问、侦察和代码执行,并具备动态更新C2域名的能力。该活动与先前披露的ZipLine恶意软件在战术上存在重叠。 2026-4-16 17:52:0 Author: thehackernews.com(查看原文) 阅读量:8 收藏

Cybersecurity researchers have warned of an active malicious campaign that's targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025.

"PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections," Cisco Talos researcher Chetan Raghuprasad said in a report published today.

"PowMix embeds the encrypted heartbeat data along with unique identifiers of the victim machine into the C2 URL paths, mimicking legitimate REST API URLs. PowMix has the capability to remotely update the new C2 domain to the botnet configuration file dynamically."

The attack chain begins with a malicious ZIP file, likely delivered via a phishing email, to activate a multi-stage infection chain that drops PowMix. Specifically, it involves a Windows Shortcut (LNK) that's used to launch a PowerShell loader, which then extracts the malware embedded within the archive, decrypts it, and runs it in memory.

The never-before-seen botnet is designed to facilitate remote access, reconnaissance, and remote code execution, while establishing persistence by means of a scheduled task. At the same time, it verifies the process tree to ensure that another instance of the same malware is not running on the compromised host.

PowMix's remote management logic allows it to process two different kinds of commands sent from the C2 server. Any non #-prefixed response causes PowMix to shift to arbitrary execution mode, and decrypt and run the obtained payload. 

  • #KILL, to initiate a self-deletion routine and wipe traces of all malicious artifacts
  • #HOST, to enable C2 migration to a new server URL.

In parallel, it also opens a decoy document with compliance-themed lures as a distraction mechanism. The lure documents reference legitimate brands like Edeka and include compensation data and valid legislative references, potentially in an effort to enhance their credibility and trick recipients, like job aspirants.

Talos said the campaign shares some level of tactical overlap with a campaign dubbed ZipLine that was disclosed by Check Point in late August 2025 as targeting supply chain-critical manufacturing companies with an in-memory malware called MixShell.

This includes the use of the same ZIP-based payload delivery, scheduled task persistence, and the abuse of Heroku for C2. That said, no final payloads have been observed beyond the botnet malware itself, leaving questions about its exact motives unanswered.

"PowMix avoids persistent connections to the C2 server," Talos said. "Instead, it implements a jitter via the Get-Random PowerShell command to vary the beaconing intervals initially between 0 and 261 seconds, and subsequently between 1,075 and 1,450 seconds. This technique attempts to prevent detection of C2 traffic through predictable network signatures."

The disclosure comes as Bitsight sheds light on the infection chain associated with the RondoDox botnet, highlighting the malware's evolving capabilities to illicitly mine cryptocurrency on infected systems using XMRig on top of the existing distributed denial-of-service (DDoS) attack functionality.

The findings paint the picture of an actively maintained malware that offers improved evasion, better resilience, aggressive competition removal, and an expanded feature set.

RondoDox is capable of exploiting over 170 known vulnerabilities in various internet-facing applications to obtain initial access and drop a shell script that performs basic anti-analysis and removes competing malware before dropping the appropriate botnet binary for the architecture.

The malware "does multiple checks and implements techniques to hinder analysis, which include the usage of nanomites, renaming/removing files, killing processes, and actively checking for debuggers during execution," Bitsight Principal Research Scientist João Godinho said.

"The bot is able to run DoS attacks at the internet, transport and application layer, depending on the command and arguments issued by the C2."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/newly-discovered-powmix-botnet-hits.html
如有侵权请联系:admin#unsafe.sh